[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Clips December 18, 2002



Clips December 18, 2002

ARTICLES

FTC Plans Registry To Block Sales Calls
DMCA critics say reform still needed
Report: China Detains Online Publisher
Some Companies Will Release Customer Records on Request
E-Gov Act signed into law
Homeland e-learning group created
Government IT personnel moves
TSA issues RFI on biometrics products
Defense CIO approves next step in NMCI
Evans lays out CIO Council's goals
Federal agencies slip slightly on customer satisfaction survey
Bush Promotes Anti-Missile System
Tech Sniffs Employee Offenders  [Privacy]
China Makes It Easier to Buy a .cn Web Site Name
Malaysia Arrests Three Over Terror Rumors on Net
Web surfers vulnerable to Flash flaw
Pentagon announces data project
Student gets A for hacking school computer
New EU guidelines for e-health websites
Web consortium releases accessibility standards
FCC Adopts Measure to Maintain Universal Service Fund
Patent Office starts testing paperless processing system


*************************** Washington Post FTC Plans Registry To Block Sales Calls Telemarketers Vow To Fight Proposal By Caroline E. Mayer Wednesday, December 18, 2002; Page E01

The Federal Trade Commission is scheduled to announce today its long-awaited plan to curb unwanted telephone solicitations: a national do-not-call registry that consumers can easily join, by dialing a toll-free number from their home telephone and then punching in some numbers or by signing up through the Internet.

FTC officials expect 60 million Americans to register when the list becomes operational -- which won't be for at least several more months. It still faces logistical and legal hurdles, including a possible lawsuit by the telemarketing industry, which makes more than 100 million calls a day.

If and when the list is up and running, telemarketers would have to scour it every three months and would be barred for five years from calling the consumers who signed up. Consumers would then have to renew their registration. If they get called anyway, those on the list can call another toll-free number to complain. The FTC would then investigate and could fine telemarketers up to $11,000 for each banned call.

The agency will ask Congress for permission to collect an estimated $16 million in fees from telemarketers to pay for the do-not-call registry -- more than three times the initial $5 million estimate officials gave in January when they proposed it. Sources who have been briefed on the rule said the FTC then plans to charge an annual fee, perhaps as much as $8,000 for a large telemarketing operator, significantly higher than originally estimated.

The agency doesn't expect consumers to notice the impact of the new registry until next summer at the earliest, after the agency seeks temporary funding from Congress to set up the call list and get it running.

The Direct Marketing Association said yesterday, even before the rule was announced, that it believes the FTC action is "unlawful in a number of respects" and plans to "pursue all legal and equitable courses of action to protect the American teleservices industry." Another industry group, the American Teleservices Association, said that consumers buy more than $275 billion in goods and services annually from telemarketers -- about 4 percent of all consumer sales.

If the registry survives a court challenge, consumers shouldn't expect a completely call-free dinner hour. That's because the call list, at least initially, will still allow many unsolicited calls to get through, including those from insurance companies, banks and telecommunications firms, because these industries are not regulated by the FTC.

But agency officials said they hope the Federal Communications Commission will soon revise its telemarketing rules to make these industries comply. In September, the FCC signaled it was considering such a change after receiving an increasing number of complaints about telemarketers.

Regardless of that possible action, the FTC rules would still permit unsolicited calls from charities and politicians, who don't fall under the government's definition of telemarketers.

The agency would also permit firms that have an "existing business relationship" with a consumer to continue to call -- for 18 months after a consumer makes a purchase, or for three months after an inquiry about a product or service.

A large conglomerate, such as AOL Time Warner Inc., where subsidiaries have different names and services, would not be able to claim that an existing relationship in one part of the company allows a telemarketing call from an another part of the firm. Thus, a person with a subscription to Time magazine could get calls from Time and Time-Life Books but not from America Online Inc., sources said.

It's unclear how the FTC rule would mesh with the 28 states that have already enacted laws setting up their own state do-not-call registries. For now, state and federal officials say consumers would have to call both the state and federal lists to make sure interstate and intrastate solicitations are blocked. Eventually FTC officials said they hoped a single call to the federal list would cover all calls. The federal agency is also counting on state law enforcement officials to help police its do-not-call rules.

There are no do-not-call registries in Maryland, Virginia or the District. But officials from some other states with existing lists don't like the federal rule. "We're concerned about confusion, we're concerned about preemption and we're concerned about loopholes," said Jeremiah W. "Jay" Nixon, attorney general of Missouri, where 1.1 million phone lines have been registered on the state's do-not-call list, which was started in July 2001.

After its first nine months of operation, the Missouri registry was generating 50 complaints a day, and Nixon had assigned 38 of his 200 lawyers to investigate them. The state brought 62 legal actions against alleged violators during that period.

As part of the rule, the FTC will also order telemarketers, within a year, to start transmitting caller-ID information when they call, so consumers with caller ID -- about half the country's phone users -- would be able to know who is calling. Telemarketers would also be restricted in their use of automated dialers, the use of computers to call homes in advance of having a salesperson available to talk -- leading to "dead air" at the other end of the phone when you pick it up.
********************************
CNET
DMCA critics say reform still needed
By Declan McCullagh
Staff Writer, CNET News.com
December 17, 2002, 6:35 PM PT


WASHINGTON--A congressman who is trying to defang a controversial copyright law said Tuesday that he's not deterred by an acquittal in the first criminal prosecution brought under it.
Rep. Rick Boucher, D-Va., who in October proposed rescinding part of the Digital Millennium Copyright Act (DMCA), said the law remains a problem even though a jury ruled a software maker ElcomSoft was not guilty of willfully violating it.


"As far as the bill going forward is concerned, the need for the legislation is as great as ever," Boucher said in an interview. "While this jury reached a commendable decision, another jury in a future case that involves similar facts could well convict. The law clearly contemplates conviction in circumstances where no infringement occurs but the technology facilitates bypassing a technological protection measure."


By repealing key portions of the DMCA, Boucher's bill would have prevented the Justice Department from prosecuting ElcomSoft, a Russian company that sold a program to remove the copy protection from Adobe's e-books. If the proposed Digital Media Consumers' Rights Act, co-sponsored by John Doolittle, R-Calif., were to become law, ElcomSoft's Advanced eBook Processor would become legal to sell.


Boucher said he will re-introduce his bill without any changes when the 108th Congress begins in January. "The result of such a law remaining on the books is that companies will be more reluctant to introduce new technology that has lawful uses such as facilitating the exercise of fair use rights, but which also circumvents technological protection measures and could facilitate copyright infringement," Boucher said. "And so to encourage the introduction of useful technologies, the legislation is needed and it will go forward."

Currently the DMCA says that no one may sell or distribute any product that "is primarily designed or produced for the purpose of circumventing a technological measure." Some limited exceptions apply to librarians, police, people conducting reverse engineering, and encryption researchers.

But when Linux programmers wrote the DeCSS utility to play DVDs on their computers, eight movie studios sued and a federal judge and an appeals court ruled the program violated the DMCA. Ed Felten, a Princeton University computer scientist, and his co-authors were also threatened with legal action by the music industry if they published a paper describing flaws in a digital watermark system.

The Business Software Alliance, a trade association for large software makers such as Microsoft and Adobe, said it was happy the prosecution was brought.

"Although the jury decided the DMCA had not in this case been violated, we are glad that prosecutors do believe that such cases have an appropriate place in our criminal justice system," the group said in a statement. "The DMCA has clear criminal penalties that can and should be imposed in cases of direct or attempted theft of software and other digital content."

Under federal law, people who violate the DMCA "willfully and for purposes of commercial advantage or private financial gain" can be fined up to $500,000 and imprisoned for up to five years for the first offense.

Jonathan Band, a partner at Morrison and Foerster who worked to limit the scope of the DMCA when Congress was debating it, said the law is still as worrisome as it ever was.

"If Adobe had sued ElcomSoft, ElcomSoft would not have had a lot of defenses," Band said. "All Adobe would have had to prove was that they circumvented a technical protection measure. But because there was a criminal proceeding, there was a higher standard. You had to show not just a violation but a willful violation. And you had to show that beyond a reasonable doubt, not just a preponderance of the evidence. That makes it much more difficult to prevail."

Band said he applauded the Boucher-Doolittle bill. "This (verdict) does not have the slightest impact at all on civil liability under the DMCA," Band said. "The only reason the case came out the way it did was because it was a criminal case with the standard of willful violation."

The Boucher-Doolittle bill would make three changes to the DMCA, all designed to permit people to bypass copy-protection schemes for legitimate purposes:

? An exemption would be created saying anyone who "is acting solely in furtherance of scientific research into technological protection measures" would be able to distribute his or her code. That would permit Felten and other researchers--such as a programmer being represented by the American Civil Liberties Union (ACLU) in a current lawsuit--to publish their work without the threat of lawsuits.

? Bypassing technological protections would be permissible if done for legitimate "fair-use" purposes. The bill says it would not be a violation of federal law to "circumvent a technological measure"--as long as it does not lead to "an infringement of the copyright in the work."

? Creating a utility like DeCSS.exe might become legal. The bill says it would be legal to "manufacture, distribute, or make noninfringing use of a hardware or software product capable of enabling significant noninfringing use of a copyrighted work."
********************************
CNET
Sun accuser suffers setback



By Ed Frauenheim Staff Writer, CNET News.com December 17, 2002, 7:24 PM PT


SAN FRANCISCO--The judge in a Labor Department case involving Sun Microsystems threw out much of the evidence submitted by a former employee who claims Sun illegally laid off U.S. citizens while retaining foreigners working under temporary, H1-B visas.
In an administrative law hearing stemming from ex-employee Guy Santiglia's appeal of an earlier ruling by the Labor Department, Judge Jennifer Gee found Tuesday that a variety of documents submitted by Santiglia were not admissible. Gee cited various reasons, including a lack of authentication.


In last October's ruling involving Santiglia's accusation that Sun violated regulations of the H-1B guest worker program, the department concluded that the company committed only minor mistakes, failing in three instances to properly post notice of its application for the right to hire H-1B workers.


Santiglia, a system administrator laid off by Sun in November of 2001, has accused the company of violations including harming the working conditions of U.S. employees with guest workers, failing to properly post notices in the workplace, and failing to provide proper access to public documents.


Sun rejects Santiglia's charges as meritless. Other federal agencies, such as the Equal Employment Opportunity Commission and the Department of Justice, have dismissed claims against Sun by Santiglia.

The H-1B visa program lets skilled foreign workers work in the United States for up to six years. Santiglia's complaint focuses on a part of the process of securing an H-1B visa. That part of the process, called the labor condition application, or LCA, requires employers to describe the salary that will be paid to a given guest worker and to testify that use of the H-1B won't harm working conditions of a U.S. employee in a comparable work roll. Employers don't have to hire the H-1B worker referred to on an LCA, but they must provide notice of the LCA to their existing employees.

To support his appeal of the Labor Department ruling, Santiglia presented the court with print outs of e-mails from former Sun workers saying they did not see workplace notices of LCAs. Santiglia also offered an e-mail from a former Sun worker who said Sun managers told him H-1Bs were preferable as new hires because "most local candidates wanted too much money."

When Sun's attorney objected to the e-mails, Judge Gee excluded them. She said Santiglia hadn't proved they were authentic.

"Where there's an objection, I've got to get it authenticated," Gee said.

Gee also threw out data Santiglia said he received from the Labor Department about Sun's LCAs. She said columns on the data weren't clearly labeled and it wasn't authenticated.

The hearing came to a close Tuesday. Gee has 60 days to issue a ruling on Santiglia's appeal.

Santiglia was glad to have his day in court. But he said he felt the "scales are tipped against you" if you're an individual opposing a corporation.

"I'm not so hopeful," Santiglia said.
**********************************
Government Computer News
OPM analyzes Homeland Security's work force
By Jason Miller

The Office of Personnel Management today is analyzing work force data for the Homeland Security Department on four job classifications to identify the new department's needs.

OPM will use a version of an Army work force analysis tool to evaluate the agencies that will be rolled into the new department. The tool will determine how many criminal investigators, procurement specialists, attorneys and computer engineers work in the component agencies and how many the new department will need, said Norm Enger, OPM e-government project director.

OPM modified the Army's Workforce Analysis Support System and Civilian Forecasting System to be used with the Enterprise Human Resources Integration e-government project. EHRI is one of five Quicksilver e-government initiatives OPM is directing.

"We want to demonstrate the tool's power to our partners," Enger said. "We will use existing data to from the Central Personnel Data File and forecast and analyze the four occupational series critical to the new Department of Homeland Security." Enger said he also plans to use data mining on the federal information database to support the needs of the new department.

Enger said the tools will be available to all agencies in January.
********************************
Associated Press
Report: China Detains Online Publisher
By JOE McDONALD, Associated Press Writer

BEIJING - The publisher of an online Chinese pro-democracy journal has been detained by police, adding to a growing number of people picked up in a crackdown on Internet dissent, a human rights group said Wednesday.


Li Yibin was secretly detained about a month ago in Beijing, New York-based Human Rights in China said in a written statement. It said other details of his case weren't known.



A spokesman for Beijing's police, Li Wei, said he couldn't confirm whether anyone by that name had been detained and didn't have any other information.



Li Yibin, believed to be 28, published the online journal "Democracy and Freedom," Human Rights in China said. It said he had a degree in computer science and worked in Beijing.



Li was detained after Liu Di, a female Beijing college student who was picked up on Nov. 7 for Internet activism, Human Rights in China said. It said Liu's university confirmed to the group that she had been formally arrested.



Another human rights group, Amnesty International, said last month that the communist government has detained at least 33 people in a crackdown on online dissent.



China encourages Internet use for business and education, and has tens of millions of Web surfers, but goes to great lengths to stamp out online political activity.



Censors monitor online chat rooms for unwanted comments, and filters block Web surfers from seeing sites run by foreign news organizations, human rights groups and Chinese activists abroad.



Both Amnesty and Human Rights in China appealed to a U.S. delegation that was in Beijing this week for human rights talks to press for their release.



"Liu Di, Li Yibin and others have done nothing more than post their views, but the government's current obsession with the Internet has subjected them to harsh persecution," Human Rights in China said.


The head of the U.S. delegation, Assistant Secretary of State Lorne Craner, said Tuesday that it had raised cases of several prisoners but wouldn't say how Chinese officials responded. China hasn't released any details of the talks.


Last year, a former policeman in western China was sentenced to 11 years in prison for downloading materials from pro-democracy Web sites based abroad. Others also have been imprisoned for posting or downloading online political materials.
*******************************
New York Times
December 18, 2002
Some Companies Will Release Customer Records on Request
By JOHN SCHWARTZ


Nearly a quarter of the corporate security officers in a survey to be released today said they would supply information about customers to law enforcement officials and government agencies without a court order. If an investigation concerned national security, the figure jumps to 41 percent.

"If you're a customer in somebody's database, you cannot be completely confident that the information you've provided whatever the business might be is not going to be shared with law enforcement agencies in the course of their investigations," said Lew McCreary, the editor of CSO magazine, which conducted the survey.

In the survey of 797 chief security officers (a title commonly abbreviated as C.S.O.) 43 percent said they would require a court order before providing information on customers, employees or partner organizations.

The security officers who took part in the survey work in financial, retail, health care and many other fields, and the companies they work for range in size from fewer than 500 employees to more than 30,000.

The survey questions do not give a sense of what information might be shared or under what circumstances. The results will provide further fuel for the controversy surrounding issues of privacy and national security since the Sept. 11 terrorist attacks.

But growing concerns about government encroachments on privacy and civil liberties have not taken into account the degree to which people hand over information willingly, said Mark Rasch, a former federal prosecutor who now works for Solutionary, a computer security company.

"We've been so worried about giving them extra power and authority without worrying about what they can do with no extra power and no extra authority, just by asking," Mr. Rasch said.

Legal experts were divided on the implications of the survey. "These companies have obligations to their customers and their clients to protect the confidentiality of records in their possession," said Marc Rotenberg, executive director of the Electronic Privacy Information Center, a policy and advocacy group in Washington. "In disclosing this information to police officers and agencies and others, they might actually be breaching legal obligations."

The results should not be surprising to people who understand the corporate security field, said Mr. McCreary, the magazine editor. "A great many C.S.O.'s come from a law enforcement background," he said.

Some of the best-known Web companies, like eBay and Amazon, have privacy policies that allow them to furnish information without a search warrant or subpoena. An eBay spokesman, Chris Donlay, said that "we let people know right up front that we do provide information to law enforcement" as part of antifraud policies. The company will provide the kind of information that is available to its users, like an e-mail address and profile, without a subpoena, but generally requires one before providing other information. If a user does not want his information provided to law enforcement agents, Mr. Donlay said, "we probably don't want them on our site."

Patty Smith, a spokeswoman for Amazon, said that requests from law enforcement were not uncommon but that the company would resist if it believed the requests violated customer rights. "Even if they have a valid subpoena, we don't necessarily hand it over," Ms. Smith said. "Our first concern is the privacy interest of our customers."

Orin S. Kerr, an associate professor at George Washington University Law School and a former Justice Department lawyer, said that Sept. 11 had changed public attitudes. Before the attacks, some Internet companies would fight search warrants. Now, Mr. Kerr said, there is "a renewed appreciation for what the F.B.I. is trying to do."

"If it's a terrorism case, with fear of weapons of mass destruction, it's pretty good that the information is disclosed," he said. "If it's a small criminal case with no connection to terrorism, maybe it's not so good."
**********************************
Federal Computer Week
E-Gov Act signed into law
BY Judi Hasson
Dec. 17, 2002


President Bush signed the E-Government Act of 2002 today, creating a law that will make it easier to get more government information and services online.

The new law will bring government fully into the electronic age, "giving taxpayers the same round-the-clock access to government that they have come to expect from the private sector," according to Sen. Joe Lieberman (D-Conn.), co-author of the legislation.

The law establishes an Office of Electronic Government, headed by an administrator appointed by the president. It authorizes $345 million over four years for interagency government projects and establishes an online directory of federal Web sites.

"The idea behind this law is for the federal government to take full advantage of the Internet and other information technologies to improve its efficiency and to secure its electronic information," Lieberman said.

Paul Brubaker, an architect of the Clinger-Cohen Act of 1996 that targeted federal IT management and cost overruns, said the new law is a beginning, but it is not a "panacea" for e-government.

"It's going to take a while," said Brubaker, who has started his own consulting company.

The measure also mandates a number of new directives, requiring regulatory agencies to conduct administrative rulemaking on the Internet and federal courts to post judicial opinions and other information online.

It also makes it easier for state and local governments to use federal contracting vehicles, and it backs share-in-savings contracts in which the government pays contractors out of savings from an efficient project.

The e-government law "reflects an invigorated commitment to applying information technology to improve service delivery, operations and information security," said Dave Marin, spokesman for Rep. Tom Davis, (R-Va.) one of the bill's authors.

"Rep. Davis intends to oversee implementation of this legislation to make sure agencies are indeed committed to e-government and to make sure we really are confronting the challenges of making the transition to e-government meaningful and valuable," Marin said.
*****************************
Federal Computer Week
Homeland e-learning group created
BY Diane Frank
Dec. 11, 2002


The Office of Homeland Security has created a new working group to focus entirely on developing common e-learning tools and courses for the new Homeland Security Department.

The group is intended to make sure that internal and external training are coordinated across the department, Lee Holcomb, director of infostructure for the Office of Homeland Security, said Dec. 10.

"E-learning, in my opinion, will be an important part of the new department," he said, speaking at the E-Gov Homeland Security conference, sponsored by FCW Media Group, in Washington, D.C.

Calls went out last week to all the organizations that are moving into Homeland Security asking for training officials to get involved in the working group, Holcomb said.

Internal employees will be trained, and the department also will lead training development for state and local agencies and other first responders.

Holcomb, the former chief information officer at NASA, said that the best approach likely will be to build on training that already exists, much the way NASA did with the computer-based information security training developed by the Defense Information Systems Agency.
******************************
Federal Computer Week
Roster Change
Government IT personnel moves
Dec. 17, 2002.
Email this to a friend.


Jim Flyzik announced Dec. 11 that he is joining two leading information technology consultants to start a firm that will advise companies on doing business with government.

Immediately following his retirement from government Dec. 17, Flyzik will begin to work with Robert Guerra and Phil Kiviat to form Guerra, Kiviat & Flyzik. Guerra has run Robert J. Guerra & Associates for eight years, and Kiviat has run the consulting firm the Kiviat Group for three years.

Flyzik most recently was the lead IT adviser in the Office of Homeland Security and previously was chief information officer for the Treasury Department.

For more, see "Flyzik forming consulting firm."

***

Fernando Burbano, former chief information officer at the State Department, has taken on a new role within the department as a senior adviser on homeland security.

Earlier this month, Burbano assumed his new role in the deputy secretary's homeland security office within the State Department. It is a new office, Burbano said, created to work on and coordinate homeland security issues within the office and to serve as a liaison with new Homeland Security Department.

No replacement for Burbano has been named, but in the meantime Bruce Morrison, deputy CIO for operations, is acting CIO.

For more, see "Burbano takes on homeland job."

***

Raymond Wells has been named chief technology officer of IBM Corp.'s federal group, the company announced Dec. 10.

Wells will coordinate a unified sales and services approach and focus on integrated federal software applications. He will guide efforts to revitalize government infrastructures using a combination of IBM's WebSphere, Lotus, Tivoli and Data Management products.

Wells, who once served as chief financial officer and chief technology officer for Alabama, has more than 35 years of experience in IT. Most recently, he was director of strategic transformations in IBM Software's Application Integration and Middleware Division, specializing in IT upgrades within the U.S. government's classified agencies.

***

Jim Leto has been appointed chief executive officer of project management consulting firm Robbins-Gioia Inc.

Leto formerly served as chairman and CEO of PRC, a $900 million science and technology firm. During his tenure, PRC achieved annual operating income growth of 40 percent.

John Gioia, founder of Robbins-Gioia, will continue to serve as chairman of the board. Avon James, who has served as president for three years, will remain in that job.
**************************
Government Computer News
TSA issues RFI on biometrics products
By Dipka Bhambhani


The Transportation Security Administration has released a request for information to all biometric technology vendors wishing to participate in the agency's test of biometric devices at 20 airports.

TSA plans to select one or two devices during the month from each vendor for its Airport Access Control Pilot Program. It is seeking "information on the technical capabilities, catalog price, implementation costs, and availability of equipment that is suitable for this application," the RFI said.

The pilot will focus on verifying the identities of airport and airline employees for access control. The devices will include facial, fingerprint, hand geometry, iris and voice recognition technologies. They will be tested at airport turnstiles, terminal doors to baggage areas and airline crew access points between terminals and aircraft.

TSA wants components, devices or systems that can be deployed in limited quantities within three months and devices that will work for full-scale deployment in nine months. The agency plans to release a request for proposals for systems integrators on the National Institutes of Health's Chief Information Officer Solutions & Partners 2 Innovations contract that will install and test the various biometric technologies for the pilot.

"The systems integrator will coordinate with vendors of selected equipment to install and test the equipment to determine the effectiveness of the devices with respect to the type of secured access control and airport category and environment," the RFI said.
*****************************
Government Computer News
Defense CIO approves next step in NMCI
By Dawn S. Onley


Defense CIO John Stenbit said today that he is satisfied with the progress of Navy-Marine Corps Intranet testing and will allow the Navy to move 100,000 more seats to the NMCI environment.

Stenbit said the results of four months of testing demonstrated that NMCI was ready to move to the next level. He reviewed tests conducted by the Navy's Operational Test and Evaluation Force Command and the Fleet Industrial Warfare Center, the Army Information Systems Engineering Command, lead contractor Electronic Data Systems Corp., and the Institute for Defense Analysis, an independent agency hired by DOD to oversee Navy testing.

"We believe that an acceptable testing process has been implemented and the test results demonstrated that the NMCI" staff can identify problems and take steps to fix them, and implement improvements as the program evolves, Stenbit said in response to an e-mail message.

He said full certification of his findings would be released to the Navy within a week.
******************************
Government Computer News
Evans lays out CIO Council's goals
By Jason Miller


Over the next year, to improve how agencies and systems communicate, the CIO Council will consider publishing a governmentwide dictionary of IT terms and will develop standards for Extensible Markup Language data definitions. These are two of the six goals Karen Evans, the council's new vice chairwoman, laid out yesterday in a memo to agency CIOs.

The council elected Evans, the Energy Department CIO, last month. She takes over for James Flyzik, who retires today.

In the memo, Evans described her vision of where the council is heading and the priorities it will work on.

"As I see it, the Federal CIO Council stands today at a crossroad," she said. "Signs that the government as a whole has seen the importance of IT systems are all around. Together [with the Office of Management and Budget], we are teaming for results and working to drive IT management in government."

Along with governmentwide XML data standards and a set of common definitions, Evans said the council will work to guide agencies' use of enterprise architectures and develop interagency transaction standards. She said the council also will concentrate on IT work force training, especially project managers. Evans said the council will cooperate with OMB to formulate policy and work with agencies to implement those policies.
*****************************
Government Executive
December 17, 2002
Federal agencies slip slightly on customer satisfaction survey
By Amelia Gruber
agruber@xxxxxxxxxxx


The public's overall satisfaction with government services fell slightly from an all-time high last year, according to the latest American Customer Satisfaction Index, released Monday.


Federal agencies earned a score of 70.2 out of a possible 100 points in 2002, down roughly 1.5 percent from last year's score of 71.3. Even though the overall score for satisfaction with government services fell, some agencies drew nearly even with private, nonmanufacturing companies. The average score for the public and private sectors combined rose from 72 to 73.1 over last year.



The annual survey, conducted by the University of Michigan Business School's National Quality Research Center, measures customer satisfaction with seven economic sectors, 35 industries, 190 companies and federal and local government agencies. In 2002, the surveyors questioned 39 different groups of customers who receive government services. Of the 39, 17 groups participated in last year's survey and 22 were new additions.



This year, the survey included satisfaction scores for government Web sites for the first time. The government outpaced private companies in this category, earning an average of 74 points, versus 73.1 points for the private sector. Within the government, the Health and Human Services Department's Office of Women's Health received the highest score80 points.



Larry Freed, CEO and president of ForSee Results, one of several companies providing financial support for the survey, attributed the high satisfaction with government Web sites to their ability to reduce costs of communicating and to provide the public with access to consistent, high-quality information.



The slight drop in overall satisfaction with government services is largely because Medicare recipients and corporate tax filers were less pleased in 2002, according to Claes Fornell, a professor at the University of Michigan Business School. Satisfaction with Centers for Medicare and Medicaid Services fell 3 percentage points, from a score of 79 in 2001 to a score of 76 this year. And businesses filing taxes with the Internal Revenue Service were also less satisfied in 2002, contributing to a 9 percent decrease in the agency's score.



But survey analysts praised the IRS for improving satisfaction among individual tax filers. Satisfaction in this subgroup earned a score of 62, representing a 22 percent increase since 1999. "No organization, whether private or public, has shown a similar improvement in such a short period of time," Fornell wrote in an analysis of the survey.



The improved score is a tribute to the simplicity and efficiency of electronic filing, according to Fornell. The IRS scored a 78 with electronic filers, compared with a 53 from paper filers.



Of federal agencies participating in the survey, the U.S. Mint, which sells coins to collectors, received the highest satisfaction rating, even though its score dropped from 88 points last year to 84. Survey respondents also gave the Social Security Administration high marks. The agency received a score of 83 from retirement benefits recipients. The Veterans Health Administration, part of the Veterans Affairs Department, received 81 points from inpatients at VA medical centers.



Fornell also praised the Federal Aviation Administration for improvement "at a time when airlines are under significant security and financial pressures." The FAA's score rose 9 percent in the past year, from 59 points to 64 points. An effort to serve pilots better by presenting policies and regulations in clear, plain language, helped boost the score, according to Fornell.



In general, customers tended to rate regulatory agencies such as the Food and Drug Administrationwhich earned 67 pointslower than service-based agencies like SSA. Also, agencies need to focus on timely service delivery, according to Fornell. Overall, government agencies rated an average of 80 points on professionalism, 82 points on courtesy and 73 points on timeliness.
********************************
Wired News
Bush Promotes Anti-Missile System


WASHINGTON -- President Bush said Tuesday he will begin deploying a limited system to defend the nation against ballistic missiles by 2004.

Though the first parts of the system will be put into use while more advanced technology is still being developed, Secretary of Defense Donald Rumsfeld said it will likely stop "a relatively small number of incoming ballistic missiles, which is better than nothing."

As a candidate, Bush promised to build an anti-missile shield, and earlier this year he pulled out of an anti-ballistic missile treaty to advance the plan. Tuesday, he cited the Sept. 11, 2001, terrorist attacks on America as evidence that the country faces "unprecedented threats" and needs the anti-missile shield.

"When I came to office, I made a commitment to transform America's national security strategy and defense capabilities to meet the threats of the 21st century," Bush said in a prepared statement. "Today I am pleased to announce we will take another important step in countering these threats by beginning to field missile defense capabilities to protect the United States as well as our friends and allies."

He called the initial stage "modest," but said, "These capabilities will add to America's security and serve as a starting point for improved and expanded capabilities later as further progress is made in researching and developing missile defense technologies and in light of changes in the threat."

The plan calls for 10 ground-based interceptor missiles at Fort Greely, Alaska, by 2004 and an additional 10 interceptors by 2005 or 2006, defense officials said, speaking on condition of anonymity.

Bush said the "initial capabilities" will also include sea-based interceptors and sensors based on land, at sea and in space.

Asked at a Pentagon press conference how he could be confident in fielding a system considering some recent failures in testing, Rumsfeld said, "most things don't just arrive fully developed."

"The way to think about the missile defense program is that ... it will evolve over time."

Rumsfeld used as an example the Predator unmanned aerial vehicle, the spy plane that became a big asset in the war in Afghanistan, although it was still in testing. The Predator allowed troops to gather intelligence without endangering pilots, and ones fitted with missiles allowed the CIA to carry out attacks without endangering their agents.

Rep. Duncan Hunter, the likely next chairman of the House Armed Services Committee, lauded the decision to proceed on missile defense and said Congress would likely approve additional money. He said an extra $1.5 billion would likely be needed over the next two years for the program that was budgeted for $7.8 billion in 2003.

"Today, the United States cannot stop a single ballistic missile headed for an American city," said Hunter (R-Calif.), who chairs the Armed Services subcommittee on military research and development. "The consequences of such an attack would be devastating, and the danger continues to grow as nations such as North Korea, Iraq and Iran continue to develop, purchase and sell advanced ballistic missile technologies."

But David Sirota, spokesman for Democrats on the House Appropriations Committee, questioned Bush's priorities.

"If George Bush thinks we are so flush with cash that we can afford billions to deploy a technology that might not even work, then why has he repeatedly rejected funding for basic security like border patrol, Coast Guard and immigration services that we know is desperately needed to prevent another September 11th?" he said.

Bush's announcement came six days after the latest test of the system failed when an interceptor rocket did not separate from its booster rocket and destroy a Minuteman II intercontinental ballistic missile as planned.

Three of eight tests of the interceptors have been judged failures by the military.

The initial Bush plan is more limited than the Strategic Defense Initiative envisioned by President Reagan in 1983 that came to be known as "Star Wars."

Still, Bush expanded the program significantly from the ground-based plan pursued by former President Clinton by also ordering research and testing on sea-based and space-based systems.

The Pentagon has begun conducting tests with short-range missile-defense systems that were prohibited by the ABM Treaty and has built and tested mobile and sea-based sensors to track missiles.

White House spokesman Ari Fleischer said the missile defense timing had nothing to do with North Korea's recent admission that it had a secret program to enrich uranium to make nuclear weapons. But, he noted, Bush cited North Korea as a threat when he promised during his campaign to build an anti-missile safety net.

The United States has asked to use a radar complex in northern England as part of a global missile defense shield, the British government said Tuesday. American officials have also asked NATO member Denmark if it can upgrade a radar station at an American Air Force base in Greenland as part of the system.
***********************************
Wired News
Tech Sniffs Employee Offenders


NEW YORK -- There are no bodies, bones or blood to analyze. No pondering over a piece of decaying evidence that was once part of a human being.

But the forensics software on display at this year's Infosecurity 2002 tradeshow is enough to spook corporate employees everywhere.

Computer forensics applications are typically used to investigate computer crimes and to preserve digital evidence so it's usable in court. But these applications aren't just for law enforcement officials anymore. Computer forensics software is helping stop corporate crime before it happens.

The software watches what employees do, and in some cases matches that usage data with employees' personal profiles to pick out the worker who is most likely to turn to a life of crime.

"There's a growing acknowledgement among executives that insiders can do more damage than the smartest outside hacker," said Nicholas Natella, a Manhattan systems administrator.

"And there's also a sense that if you don't protect information from insiders, the company could become embroiled in a really ugly lawsuit."

Some systems administrators at large companies said they are increasingly being asked to quietly collect digital evidence on difficult employees -- those who are in danger of being fired, or who have just been fired.

Companies are also employing snoopy software to make sure their employees aren't stockpiling corporate secrets.

Products like EnCase Enterprise Edition keep a wary eye out for both outside and inside attacks. EnCase scours the network to see if employees possess "unauthorized information" in order to help the company protect itself against fraud, legal problems and other issues.

Savvydata's RedAlert goes a step further, collecting, consolidating and analyzing internal and external employee information to determine an individual's threat to the organization. Savvydata claims RedAlert can predict which employee is most likely to be involved in malicious activities such as theft of sensitive information.

RedAlert 2.0 includes the company's newest security offering, Intelligent Information Dossier plus. IID+ is an optional subscription-based component that allows corporate IT folks to research employees' criminal histories, credit information, financial asset details, friends and associates.

That data can be combined with RedAlert's collection of internal data -- such as what files employees accessed, the contents of their e-mails and what company policies they violated -- to draw what Savvydata reps describe as a "clear picture that can be used in determining an employee's risk to your organization."

"RedAlert totally freaked me out," said Jeff Newhouse, a systems administrator for a Wall Street firm. "I understand why you'd need something like this if you are the CIA, but for standard biz use ... I just don't think I'd work at a company that used these sorts of tools."

"I figure companies are damned if they do and damned if they don't," said Nick Freson, a systems administrator from Brooklyn. "They get blamed if they don't audit their systems for employee fraud, and they get blamed if they do."

Not all the software on display is aimed at detecting employees who are running amok. Some of the applications being demonstrated are simply intended to make a computer forensics investigator's life easier.

WetStone Technologies is demonstrating NEXTWitness, a Web-based forensic data collection tool that captures, timestamps and then seals records of website content that can be used for digital evidence.

WetStone also demonstrated Time Lock Biometric, which uses fingerprint authentication to prove who authored a Microsoft Word document.
********************************
Reuters Internet Report
China Makes It Easier to Buy a .cn Web Site Name
Doug Young


HONG KONG (Reuters) - Relaxed rules for registering Web site names in China are likely to spark a surge in applications, including from foreign companies previously barred from using the .cn designation, China Internet watchers said.


New guidelines issued on Monday by the China Internet Network Information Center (CNNIC) should help to jump-start registrations of .cn names, which have been relatively anemic by global standards, experts said.



Since 1997, CNNIC has registered a scant 145,000 domain names ending with .cn -- miniscule compared with the 27.3 million .com, .org and .net addresses logged by leading U.S. domain registrar VeriSign



"They would like to see more registration not only by Chinese companies, but also by foreign companies," said a Beijing-based Internet expert who did not want his name used. "CNNIC also sees a commercial value in this. If the number of registrations increases, they will get more money."



Under the new guidelines, government-run CNNIC has designated about two dozen private companies to act as registrars for Internet domain names ending in the .cn suffix assigned to China. CNNIC previously handled all such registrations itself.



In another key change, foreign companies with no China presence will now be allowed to apply for .cn domains. That move will pave the way for firms like U.S.-based search engine Google (news - external web site) to operate China-specific sites with .cn designations even if they have no China offices.



TOP LEVEL DOMAIN



CNNIC will also allow .cn to be used as a "top level" domain, meaning Web sites can use .cn as the sole suffix in their address.



Previously, the .cn suffix had to be preceded by another standardized suffix indicating the nature of the site, such as .com for businesses or .org for non-profit organizations. Thus a company that previously had to use the name Widget.com.cn will now be allowed to use simply Widget.cn.



The expert in Beijing said there was no connection between the moves and China's censorship of the Internet, which recently extended to a temporary block on access to Google and another search engine, AltaVista.


Among the two dozen companies that will be allowed to register .cn addresses, only one, NeuStar of the United States, is based outside China. Its selection is designed specifically to draw more foreign companies, China Internet watchers said.


In its own announcement of the alliance with CNNIC, NeuStar said on its Web site it will target small- and medium-sized businesses seeking to establish a presence in the China market.



Among the Chinese companies that will soon accept registrations, U.S.-listed Sohu.com anticipates the business will provide a meaningful new revenue source, said spokeswoman Caroline Straathof.



"We think this is a good business opportunity," she said. "It's good for the consumers as well because they will have much more choice in selecting their domain names."



Changhua Qiu, a U.S.-based analyst with boutique investment advisor Forun Technology, said companies like Sohu.com will only receive limited revenues from the liberalized policy.



"Short-term there may be more registration of many names," he said. "But that's not a long-term growth business."
*****************************
Reuters Internet Reports
Malaysia Arrests Three Over Terror Rumors on Net


KUALA LUMPUR (Reuters) - Three Malaysians have been arrested under a security law allowing detention without trial for spreading rumors on the Internet that Kuala Lumpur was a target for terror bombings, police said Wednesday.


The two men and a woman, aged between 22 and 40, had bulk-forwarded an email that said several places in Kuala Lumpur, including the Petronas Twin Towers, were on a hit list for attacks to be carried out in the mid-December, police said.



"It's nothing but rubbish," a senior police official in Kuala Lumpur told Reuters.



"We're going to try and arrest as many as possible who were responsible for sending this thing out," he said, adding the email seemed to have been forwarded to dozens of people over the past two weeks.



The email, written by someone identified only as Jeremy, said the Philippine National Defense Department had received information the attacks would take place in tourist spots, malls and nightspots frequented by Westerners in Kuala Lumpur.



It accused the Malaysian government of trying to cover up the information and encouraged recipients of the email to forward it to as many people as they could.



One of those recipients was an official at the Australian High Commission, which lodged a police report through one of its staff Saturday, leading to the arrests.



The three, picked up in the capital and its outskirts between Tuesday and Wednesday.



They are being held under the Internal Security Act, which is normally used against political dissidents accused of threatening the stability of the nation and those accused of trying to overthrow the government.



The ISA empowers police to hold anyone without trial for 60 days initially and thereafter for renewable periods of two years.


The government says its policy of pre-emptive arrests has stopped Malaysia suffering the same kind of terror attacks that have occurred in neighboring Indonesia and the Philippines.
******************************
MSNBC
Web surfers vulnerable to Flash flaw
Flaw in Web animation software could be exploited
By Robert Lemos


Dec. 17 A flaw found in Macromedia's animation software leaves Web surfers vulnerable to attack when they visit an Internet site or, possibly, open an e-mail, a security firm said Tuesday. The vulnerability, found by security firm eEye Digital Security, allows an attacker to create a hand-edited Macromedia Flash, or SWF, file that can compromise a PC or Macintosh if its user views the file with the Shockwave Flash Player plug-in for Internet Explorer, Netscape or other browsers.

THE FLAW'S DANGER is compounded by the fact that Flash is so widespread and the software doesn't have a built-in upgrade system, said Marc Maiffret, chief hacking officer for Aliso Viejo, Calif.-based eEye.
"Almost every user is going to have Flash, so they can become compromised," Maiffret said. "Unless the user is smart enough to get the latest version of Flash, then they are going to be vulnerable."
More than 90 percent of Web browsers have the Flash software installed, according to Macromedia. While nearly 53 percent of Web surfers use the latest version, Shockwave Flash Player 6, the number still falls well short of the total, underscoring the problem of convincing people to upgrade.
Macromedia warned its developers of the problem last Friday, said Troy Evans, product manager for the Flash Player. He added that the only way to notify software users that they need to get the latest software is via new versions of Flash animations, so the company is focused on getting developers to do more updates.
Although getting users to upgrade is a challenge, Evans said, the company has been fairly successful. "We have 3 million downloads per day, so the players that are out there are getting updated," he said.
The flaw affects the Flash plug-in for browsers on Windows, Unix, Linux and the Macintosh.
By editing the header of a Flash file, an attacker can cause the file to execute commands and compromise the computer system. In some cases, it's possible to cause HTML e-mail to perform a similar attack, eEye said in its advisory.
The danger of flaws that require a victim to go to a specific Web site tends to be offset by the fact that a Web site can be shut down fairly quickly. For that reason, a virus that attempts to use a vulnerability in Flash or another Web technology usually has a limited effect.
In many respects, the flaw resembles another vulnerability that eEye found in the Flash Player in August. That flaw also allowed an attacker to modify the header of an SWF file and cause the Flash Player to compromise the machine on which the software was running.
"The outcome of the attack is basically identical to the one back in August," Maiffret said. "It just goes to further show that the average software company is in great need of real-world security" checking.
*****************************
MSNBC
Pentagon announces data project
By Pete Williams
NBC NEWS
Dec. 17 It is a classic dilemma for a society that thrives on the right of privacy: How do you balance those rights with the need to protect against a future terrorist attack? The Pentagon has a major project under study, headed by a controversial figure from the past, that digs deeply into the personal activities of individual Americans and a good deal of the early work is going to private contractors. Is this a classic example of government going too far?


COULD IT BE possible to prevent another Sept. 11-style attack by studying the steps terrorists have taken in the past and developing computer systems to flag similar behavior and alert law enforcement? The Pentagon is trying to develop technology to do just that.
"This is an important research project to determine the feasibility of using certain transactions and events to discover and respond to terrorists before they act," said Undersecretary of Defense Pete Aldridge on Nov. 20.
The project is the work of the new Information Awareness Office. The mission is to see if it's possible to gather data on such things as visas for entering foreigners, car rentals, airline ticket purchases, new drivers licenses, records of gun buys, purchases of certain chemicals, even fertilizers that can be used to make bombs, enrollment at flight schools and police arrest records.
All of that information would then be fed to powerful computers to look for patterns that could suggest a potential terrorist plot in the making.
But civil liberties groups find the project alarming, from the man put in charge John Poindexter, a central figure in the Iran-Contra scandal to the idea that the government could track the personal actions of millions of Americans every day. Tuesday, a public interest group accused the Pentagon of farming out too much of the research to contractors.
"There's questions about what kind of oversight is there when private companies are involved to this extent in the research," said Bill Allison of the Center for the Public Interest. "In a sense, it's outsourcing Big Brother."
The Pentagon says it's only researching whether such a thing could be done. The actual gathering of data, it says, would be turned over to law enforcement.
Defenders of the idea say smaller versions of the same technology already help credit card companies spot stolen cards. And a legal commentator says fears of such a system are overblown.
"The government is trying to develop ways of screening huge masses of data to look for patterns that might tip them off in advance to the next Mohammed Atta, before he kills thousands of us, because it might save thousands of lives," said Stuart Taylor of the National Journal.
For now, the project's biggest problem isn't criticism. It's whether such a massive undertaking, trying to analyze billions of transactions a day, could actually work.
******************************
CNN
Student gets A for hacking school computer
By Jeordan Legon


(CNN) -- It was a breeze for 15-year-old Reid Ellison to hack into his high school's computer grading system. But what to do once he broke in took a bit more ingenuity.

You see, Reid already has a perfect 4.0 grade point average at Anzar High School in San Juan Bautista, California. So to leave his mark, he decided to lower his grades to a 1.9 GPA -- a meager D+.

"I couldn't do what most people would want to do when they hack into the school's computer," Reid said. "So I thought it would be funny to do the opposite."

The hacking project, which was sanctioned by the school, left administrators so impressed they gave him a perfect score. The school is now working on fixing the security holes.

"I'm helping them with it," said Reid, who's been tinkering with computers since he was in second grade and wants to be an engineer. "I basically came up with three pages to improve the security of the network in general."

Getting the password

Reid's project was part of Anzar's "exhibition" requirement. To graduate, each student must complete six exhibitions -- written and oral presentations in history, science, math and language arts.

It took three hacking programs less than a second -- 200 milliseconds to be exact -- to find the password to the school's computer, Reid said. It was the school secretary's name: Silvia.

The school has since changed the password and Reid doesn't know it, but that doesn't stop the jokes from students asking their classmate for hacking help.

"If he didn't have such high moral fiber, he could probably make a lot of money off his abilities," said Wayne Norton, Reid's adviser.

Getting perfect grades back
Reid, who skipped part of the eighth grade, said he's setting his sights on college, not hacking. The Massachusetts Institute of Technology or the California Institute of Technology to be exact.


After his hacking session was documented, Reid kept a close eye on the return of his hard-earned A's.

"I made sure it was really easy for them to change it back," he said.

*******************************
Euromedia.net
New EU guidelines for e-health websites
18/12/2002

The European Commission has released a new set of quality criteria for websites providing health information to EU citizens.

The initiative is part of a response to the rapid growth of e-health services across Europe, with health-related websites - now estimated to number over 100,000 - currently ranking among the most popular destinations on the internet. The Commission is planning that the core set of principles will be adopted either as a European standard or form the basis for localised schemes within Member States, such as voluntary codes of conduct, trustmarks or accreditation systems.

According to the Commission, national and regional health authorities, relevant professional associations and private medical website owners are now expected to implement the criteria in a manner "appropriate to their website and consumers."

The standards have been developed following a pan-European consultation and are based on a broad consensus among healthcare specialists, government
departments, international organisations and website users.


The over-arching principle is that a health-related website must state clearly its target audience and take care to "ensure that both the style and nature of the information, and its presentation, are appropriate for the chosen audience".

Six key criteria, together with sub-criteria have been outlined by the Commission, which address specific quality issues particular to health-related content and also site development and maintenance. The top-level criteria, designed to be applicable irrespective of the type of information or the audience being addressed, are identified as: transparency and honesty; authority - requiring content providers to state their credentials; privacy and data protection; updating of information; accountability (setting out editorial policy and addressing responsible
partnerships) and accessibility.


In line with EU enlargement goals, a similar initiative is being undertaken covering health-related websites in the 10 EU candidate countries.
******************************
Sydney Morning Herald
Web consortium releases accessibility standards
By Jenny Sinclair
December 18 2002


The top Internet standards group has released a new set of rules for writing accessible software.

Today's release of the "UAAG 1.0" standard by the World Wide Web Consortium (WC3) completes a set of standards aimed at making Web sites easier to use for people with disabilities.

The new standard applies to software developers, and covers accessibility of the user interface, rendering of accessibility information, and user choice in configuring browsers and media players, according to a WC3 release.

These guidelines also address interoperability of mainstream browsers and multimedia players used by people with disabilities to assist their Web access.

Many of the features of the standard are already widely used, but WC3 endorsement means developers will be able to refer to a common set of rules.
Leading US disability groups and software developers have endorsed the latest release.


The guidelines can be found at www.w3.org/TR/2002/REC-UAAG10-20021217/
***************************
Sydney Morning Herald
Big rise in sites using scripting languages: survey
December 18 2002

The number of Web sites making some use of a scripting language has risen by over half, according to the latest Netcraft survey.

The monthly survey looks at Web Server software usage on Internet connected computers. In the December survey responses were received from 35,543,105 sites.

Netcraft said both PHP and ASP, the two most widely used scripting languages, had seen significant increases in deployment, as businesses constructed more sophisticated sites.

In percentage terms, the fastest growing scripting language on the Web during 2002 was JavaServer Pages. The number of IP addresses using JSP on their front page has roughly trebled in 2002, albeit from a small base of a little over 10,000 last December.
The survey found that around one percent of sites using ASP.Net were Linux-based.


The survey said the number of active sites had risen by around 17 percent over the last year, indicating that the conventional Web was still growing. The number of sites using SSL had grown by about 14 percent.

During 2002 the survey found that the Net had grown more geographically disparate. A significant reduction of 5.3 million hostnames in the US was compensated by an increase of 4.1 million hosts in Europe and the Asia-Pacific.

It said hosting facilities in the rest of the world had caught up with those in the US, with a net repatriation of sites from the US to almost every well developed overseas economy.
******************************
Broadband News
FCC Adopts Measure to Maintain Universal Service Fund


The FCC adopted a number of measures to support the universal service fund (USF), which subsidizes telecommunication services for rural areas, low-income households and public schools and libraries. According to the FCC, several market and technology trends have been undermining the viability of the USF contribution system, including increased availability of service bundles of combined local and long-distance calling. Consumer substitution of wireless and Internet telephony for traditional voice service also undermines the systems. The new FCC measures include:

Increasing from 15 to 28.5% the current interim safe harbor that allows wireless carriers to assume their revenues are interstate.
Basing USF contributions on projected, collected end-user interstate revenues, instead of the current historical, gross-billed revenues
Prohibiting carriers from including a mark-up above their USF contribution if they choose to recover their contributions costs through a phone bill line item.
Under previous rules, carriers' contributions to the USF were assessed as a percentage of their interstate and international end-user revenues. Wireline long distance companies contribute 63% of the universal service fund, while local exchange carriers and wireless carriers make up the rest.
http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-229485A1.pdf
FCC, 13-Dec-02



In July 2002, the FCC received a recommendation that no new services should be added or removed from the definition of services supported by "universal service." The main issue under discussion had been whether advanced or high-speed services should be included within the list of core services supported by a federal universal service fund. A Federal-State Joint Board on Universal Service, which was composed of three state regulatory commissioners and three FCC commissioners, found that no new service satisfies the statutory criteria of the Communications Act of 1934. The Board concluded that the public interest would not be served by expanding the scope of universal service at this time. The Board reasoned that high-speed service is not "essential" to consumers because online resources are available by voice telephone, dial-up connections and in public libraries and schools. Moreover, a substantial majority of consumers so far have chosen not to subscribe to high-speed services where they are available. The Board further cited a heavy federal financial burden to include high-speed access as part of universal service, especially in rural areas. An expansion of universal service would also violate the principle of competitive technology neutrality (DSL vs. cable). However, the Board was split on the issue of equal access of fundamental telecommunication services to all Americans.
********************************
Computerworld
Patent Office starts testing paperless processing system
By LUCAS MEARIAN
DECEMBER 16, 2002


The U.S. Patent and Trademark Office last week began testing an all-electronic patent and trademark-processing system that's expected to cost the agency more than $50 million to develop and is scheduled be fully implemented by late 2004.
The patent office, which is part of the U.S. Department of Commerce, estimated that the system will generate an annual return on investment of 30% during the first five years of use, due partly to technology upgrades aimed at eliminating more than a half-million paper files each year.


Last spring, the agency said it planned to be able to process all trademark applications electronically by next October and to have a similar process in place for patent filings a year later (see story). But it didn't disclose details about the technology it will use to support the paperless processing.

CIO Doug Bourgeois last week said the patent office had started running the system in pilot mode to process requests for patents related to the arts. The test phase is due to continue until March, he said. If all goes according to plan, production deployment will begin next June.

The Patent and Trademark Office plans to use IBM's WebSphere MQ middleware tools as an enterprise application integration hub, which will use XML to connect new document-scanning and archiving software to the agency's back-end processing system, Bourgeois said.

Applications for patents and trademarks will be sent to the integration hub, which will convert the data into a format that can be understood by the homegrown back-end system. That system was originally developed for a Unisys Corp. mainframe and was migrated to five Hewlett-Packard Co. Unix servers last year.

The document-scanning system is a modified version of an application called ePhoenix, which was developed by the European Patent Office in Munich, Germany. The software runs on an Oracle9i database and will be used to capture images of patent and trademark applications as well as follow-up communications and filings, Bourgeois said.

"We'll have an image of every piece of paper we receive," he said. The data will be indexed, and Bourgeois noted that ePhoenix includes workflow capabilities that can route filings to the next person in the application-processing chain.

Room to Grow

To help deal with the increased amount of data that it will be collecting, the Patent and Trademark Office is installing an additional 90TB of Symmetrix disk arrays from EMC Corp. on top of the 210TB it already has configured on a storage-area network. Hopkinton, Mass.-based EMC plans to announce the new purchase this week.

The migration to full electronic processing will make the agency's data backup and disaster recovery capabilities more important than they are now, Bourgeois said. The patent office currently has a stand-alone data center and does only tape backups of its mission-critical data. If systems were to crash, it would take "a long time to get back to business," Bourgeois said.

Bob Cote, a patent litigator and trial lawyer at Orrick, Herrington & Sutcliffe LLP in New York, said a paperless system for processing patent applications is long overdue. For external users, the new technology should reduce the time it takes to submit filings, make it easier to access data and reduce errors in application processing, Cote said.
**********************************


Lillie Coney
Public Policy Coordinator
U.S. Association for Computing Machinery
Suite 510
2120 L Street, NW
Washington, D.C. 20037
202-478-6124
lillie.coney@xxxxxxx


From owner-technews@xxxxxxxxxxxxxxxxx Wed Nov 27 12:43:27 2002
Received: from sark.cc.gatech.edu (sark.cc.gatech.edu [130.207.7.23])
by cleon.cc.gatech.edu (8.11.6/8.11.6) with ESMTP id gARHhRs13687
for <goodman@xxxxxxxxxxxxxxxxxxx>; Wed, 27 Nov 2002 12:43:27 -0500 (EST)
Received: from postel.acm.org (postel.acm.org [199.222.69.7])
by sark.cc.gatech.edu (8.11.6/8.11.6) with ESMTP id gARHhIa01322;
Wed, 27 Nov 2002 12:43:18 -0500 (EST)
Received: from postel (postel.acm.org [199.222.69.7])
by postel.acm.org (8.9.3/8.9.3) with ESMTP id MAA12298;
Wed, 27 Nov 2002 12:36:12 -0500
Received: from LISTSERV2.ACM.ORG by LISTSERV2.ACM.ORG (LISTSERV-TCP/IP release
1.8d) with spool id 0005 for TECHNEWS@xxxxxxxxxxxxxxxxx; Wed, 27 Nov
2002 12:18:22 -0500
Approved-By: technews@xxxxxxxxxx
Received: from hq.acm.org (hq.acm.org [199.222.69.30]) by postel.acm.org
(8.9.3/8.9.3) with ESMTP id MAA22244 for
<technews@xxxxxxxxxxxxxxxxx>; Wed, 27 Nov 2002 12:18:07 -0500
Received: by hq.acm.org with Internet Mail Service (5.5.2656.59) id <W8L29HVW>;
Wed, 27 Nov 2002 12:24:59 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2656.59)
Content-Type: text/plain; charset="iso-8859-1"
Message-ID: <545947EC482B4146BAE4AA754D14773921E0FA@xxxxxxxxxx>
Date: Wed, 27 Nov 2002 12:24:58 -0500
Sender: ACM TechNews Early Alert Service <TECHNEWS@xxxxxxxxxxxxxxxxx>
From: technews <technews@xxxxxxxxxx>
Subject: ACM TechNews - Wednesday, November 27, 2002
To: TECHNEWS@xxxxxxxxxxxxxxxxx
Content-Length: 9170
Status: O
X-Status: X-Keywords: X-UID: 340


Dear ACM TechNews Subscriber:

Welcome to the November 27, 2002 edition of ACM TechNews,
providing timely information for IT professionals three times a
week.  For instructions on how to unsubscribe from this
service, please see below.

ACM's MemberNet is now online. For the latest on ACM
activities, member benefits, and industry issues,
visit http://www.acm.org/membernet

Remember to check out our hot new online essay and opinion
magazine, Ubiquity, at http://www.acm.org/ubiquity

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ACM TechNews
Volume 4, Number 428
Date: November 27, 2002

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Site Sponsored by Hewlett Packard Company ( <http://www.hp.com> )
    HP is the premier source for computing services,
    products and solutions. Responding to customers' requirements
    for quality and reliability at aggressive prices, HP offers
    performance-packed products and comprehensive services.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Top Stories for Wednesday, November 27, 2002:
http://www.acm.org/technews/current/homepage.html

"Loss of Major Hub Cities Could Cripple Internet, Study Suggests"
"Court Finds Limits to California Jurisdiction in Cyberspace"
"China Tries to Woo Its Tech Talent Back Home"
"TeraGrid Supercomputing Project Expands"
"Volunteers Wanted for IT National Guard"
"Students Learning to Evade Moves to Protect Media Files"
"Bush Signs Homeland Security Bill"
"MIT Cooks Up Wired Kitchen Tools"
"Tough Microbes Offer Clues to Self-Assembling Nano-Structures"
"Free Software vs. Goliaths"
"Free-software Gadfly Takes on Net Group"
"San Diego Supercomputer Center Hits Data-Transfer Speed Milestone"
"Way Back When"
"Experts Mull 'Next Big Thing' in Computing"
"Software Innovation Without End"
"Throttled at Birth"
"Global Positioning System: A High-Tech Success"

******************* News Stories ***********************

"Loss of Major Hub Cities Could Cripple Internet, Study Suggests"
The centralized "hub-and-spoke" model of the Internet's
infrastructure makes it especially fragile in the event of a
terrorist attack or other catastrophe that threatens to knock out
major Internet nodes, according to an Ohio State University study ...
http://www.acm.org/technews/articles/2002-4/1127w.html#item1

"Court Finds Limits to California Jurisdiction in Cyberspace"
A Monday ruling from the California Supreme Court, in which the
justices determined that merely posting content online does not
give companies the right to sue out-of-state defendants for
copyright infringement in California courts, is considered a ...
http://www.acm.org/technews/articles/2002-4/1127w.html#item2

"China Tries to Woo Its Tech Talent Back Home"
The Chinese government is ramping up efforts to win back its
engineering and technology students who had gone to the United
States to study but stayed to do business.  Chinese consul
general Wang Yunxiang in San Francisco says jobs for returning ...
http://www.acm.org/technews/articles/2002-4/1127w.html#item3

"TeraGrid Supercomputing Project Expands"
The National Science Foundation, which apportioned $53 million
last year to fund the construction of the Distributed Terascale
Facility (TeraGrid), has authorized an additional grant of $35
million to extend the facility to include different kinds of ...
http://www.acm.org/technews/articles/2002-4/1127w.html#item4

"Volunteers Wanted for IT National Guard"
As part of the Department of Homeland Security initiative, the
federal government will put out a call for volunteers to serve in
the National Emergency Technology (NET) Guard, a taskforce of
science and technology experts that will quickly mobilize to ...
http://www.acm.org/technews/articles/2002-4/1127w.html#item5

"Students Learning to Evade Moves to Protect Media Files"
In response to warnings from entertainment companies about
students downloading copyrighted material off the Internet
without authorization, as well as the cost of such
activities' bandwidth demands, U.S. colleges are attempting to ...
http://www.acm.org/technews/articles/2002-4/1127w.html#item6

"Bush Signs Homeland Security Bill"
Bush signed the Department of Homeland Security bill into law on
Monday, thus authorizing the consolidation of 22 federal agencies
into a single body tasked with protecting the nation's critical
infrastructure.  The law has civil liberties groups worried about ...
http://www.acm.org/technews/articles/2002-4/1127w.html#item7

"MIT Cooks Up Wired Kitchen Tools"
Since 1998, MIT's Media Lab has been the center of an effort to
develop sophisticated electronic kitchen products, the foremost
being the Minerva interactive countertop, which combines cameras,
scales, and computers to assist chefs in food preparation.  Using ...
http://www.acm.org/technews/articles/2002-4/1127w.html#item8

"Tough Microbes Offer Clues to Self-Assembling Nano-Structures"
NASA biologist Jonathan Trent has proposed that a hardy
extremophile organism's resistance to high temperatures could be
exploited to produce self-assembling arrays of tiny structures,
which forms the basis of nanotechnology.  The microbe in ...
http://www.acm.org/technews/articles/2002-4/1127w.html#item9

"Free Software vs. Goliaths"
The nonprofit Free Software Foundation faces some formidable
adversaries in its struggle to support the open-source software
movement, including politicians, copyright holders, and
commercial software companies.  These organizations and ...
http://www.acm.org/technews/articles/2002-4/1127w.html#item10

"Free-software Gadfly Takes on Net Group"
Open-source advocate and Linux pioneer Bruce Perens is working to
change the Internet Engineering Task Force's (IETF) policy of
including proprietary code in its specifications.  Because the
IETF's current membership is against such a change, Perens is ...
http://www.acm.org/technews/articles/2002-4/1127w.html#item11

"San Diego Supercomputer Center Hits Data-Transfer Speed Milestone"
The San Diego Supercomputer Center (SDSC) at the University of
California, San Diego, achieved a data transfer speed of 828 Mbps
when moving data from its tape drives to disk drives,
demonstrating the type of massive storage capabilities needed for ...
http://www.acm.org/technews/articles/2002-4/1127w.html#item12

"Way Back When"
Paul Marks is the inventor of the Wayback Machine, an access
point for an online archive of roughly 2 billion Web pages that
currently takes up more than 100 terabytes (TB).  His Alexa
Internet commercial Web site cataloging business is funding the ...
http://www.acm.org/technews/articles/2002-4/1127w.html#item13

"Experts Mull 'Next Big Thing' in Computing"
Leaders of the IT industry discussed future computing trends in a
Comdex panel entitled "The Next Big Thing."  The panel focused on
wireless, security, and display technology while presenting a
vision of a world full of networks.  In the future, content would ...
http://www.acm.org/technews/articles/2002-4/1127w.html#item14

"Software Innovation Without End"
Computer visionary and inventor Alan Kay, a Palo Alto Research
Center principal whose many credits include the standard PC
interface, the highly influential Smalltalk programming language,
network client/servers, and the Ethernet, is joining ...
http://www.acm.org/technews/articles/2002-4/1127w.html#item15

"Throttled at Birth"
Matthew Williamson, a researcher at Hewlett-Packard laboratories
in Bristol, England, has devised a way to slow the spread of a
computer virus, and it appears to work.  Williamson's "throttle"
method limits the rate at which computers can connect to new ...
http://www.acm.org/technews/articles/2002-4/1127w.html#item16

"Global Positioning System: A High-Tech Success"
The Global Positioning System (GPS), which started out as a U.S.
military project to improve navigational accuracy, has evolved
into a tool that can be used by civilians as well, and has many
potential applications.  The system consists of 24 satellites ...
http://www.acm.org/technews/articles/2002-4/1127w.html#item17


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


-- To review Monday's issue, please visit
http://www.acm.org/technews/articles/2002-4/1125m.html

-- To visit the TechNews home page, point your browser to:
http://www.acm.org/technews/

-- To unsubscribe from the ACM TechNews Early Alert Service:
Please send a separate email to listserv@xxxxxxxxxxxxxxxxx
with the line

signoff technews

in the body of your message.

-- Please note that replying directly to this message does not
automatically unsubscribe you from the TechNews list.

-- To submit feedback about ACM TechNews, contact:
technews@xxxxxxxxxx

-- ACM may have a different email address on file for you,
so if you're unable to "unsubscribe" yourself, please direct
your request to: technews-request@xxxxxxx

We will remove your name from the TechNews list on
your behalf.

-- For help with technical problems, including problems with
leaving the list, please write to:  technews-request@xxxxxxx

----
ACM TechNews is sponsored by Hewlett Packard Company.

From owner-technews@xxxxxxxxxxxxxxxxx Mon Dec 2 16:14:57 2002
Received: from sark.cc.gatech.edu (sark.cc.gatech.edu [130.207.7.23])
by cleon.cc.gatech.edu (8.11.6/8.11.6) with ESMTP id gB2LEus17899;
Mon, 2 Dec 2002 16:14:56 -0500 (EST)
Received: from postel.acm.org (postel.acm.org [199.222.69.7])
by sark.cc.gatech.edu (8.11.6/8.11.6) with ESMTP id gB2LEha16555;
Mon, 2 Dec 2002 16:14:43 -0500 (EST)
Received: from postel (postel.acm.org [199.222.69.7])
by postel.acm.org (8.9.3/8.9.3) with ESMTP id QAA27976;
Mon, 2 Dec 2002 16:07:19 -0500
Received: from LISTSERV2.ACM.ORG by LISTSERV2.ACM.ORG (LISTSERV-TCP/IP release
1.8d) with spool id 0069 for TECHNEWS@xxxxxxxxxxxxxxxxx; Mon, 2 Dec
2002 15:47:30 -0500
Approved-By: technews@xxxxxxxxxx
Received: from hq.acm.org (hq.acm.org [199.222.69.30]) by postel.acm.org
(8.9.3/8.9.3) with ESMTP id PAA12112 for
<technews@xxxxxxxxxxxxxxxxx>; Mon, 2 Dec 2002 15:46:49 -0500
Received: by hq.acm.org with Internet Mail Service (5.5.2656.59) id <W8L296LC>;
Mon, 2 Dec 2002 15:54:08 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2656.59)
Content-Type: text/plain; charset="iso-8859-1"
Message-ID: <545947EC482B4146BAE4AA754D14773921E10B@xxxxxxxxxx>
Date: Mon, 2 Dec 2002 15:54:06 -0500
Sender: ACM TechNews Early Alert Service <TECHNEWS@xxxxxxxxxxxxxxxxx>
From: technews <technews@xxxxxxxxxx>
Subject: ACM TechNews - Monday, December 2, 2002
To: TECHNEWS@xxxxxxxxxxxxxxxxx
Content-Length: 8683
Status: RO
X-Status: X-Keywords: X-UID: 341


Dear ACM TechNews Subscriber:

Welcome to the December 2, 2002 edition of ACM TechNews,
providing timely information for IT professionals three times a
week.  For instructions on how to unsubscribe from this
service, please see below.

ACM's MemberNet is now online. For the latest on ACM
activities, member benefits, and industry issues,
visit http://www.acm.org/membernet

Remember to check out our hot new online essay and opinion
magazine, Ubiquity, at http://www.acm.org/ubiquity

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ACM TechNews
Volume 4, Number 429
Date: December 2, 2002

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Site Sponsored by Hewlett Packard Company ( <http://www.hp.com> )
    HP is the premier source for computing services,
    products and solutions. Responding to customers' requirements
    for quality and reliability at aggressive prices, HP offers
    performance-packed products and comprehensive services.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Top Stories for Monday, December 2, 2002:
http://www.acm.org/technews/current/homepage.html

"Black Market For Software Is Sidestepping Export Controls"
"Hollywood, Tech Become Wary Partners Against Piracy"
"Listening to the Internet Reveals Best Connections"
"Total Info System Totally Touchy"
"Fishing for Data"
"From Darwin to Internet at the Speed of Light"
"Don't Write Off Existing IT Skills"
"Biology May Help Shrink Electronic Components at NASA"
"DARPA Looks to Quantum Future"
"The Rogue DNS Phenomenon"
"Purdue Panel Maps Safer Wireless World for United Nations"
"Future Security"
"Coding with Life's Code"
"Seething over Spam"
"The Making of a Policy Gadfly"
"Software Doesn't Work. Customers Are in Revolt. Here's the Plan."

******************* News Stories ***********************

"Black Market For Software Is Sidestepping Export Controls"
Export restrictions are in place to bar the sale of scientific
and engineering software to rogue nations such as Iraq or North
Korea, but such countries can acquire these technologies easily
through a black market.  Worse, clamping down on this market is ...
http://www.acm.org/technews/articles/2002-4/1202m.html#item1

"Hollywood, Tech Become Wary Partners Against Piracy"
Executives of entertainment companies hope that partnerships with
technology companies will better their chances of curtailing the
digital piracy of music and movies, and are making efforts to
overcome long-term animosity between the two sectors.  Fox Group ...
http://www.acm.org/technews/articles/2002-4/1202m.html#item2

"Listening to the Internet Reveals Best Connections"
Chris Chafe of Stanford University's Center for Computer Research
in Music and Acoustics has developed a way to check the quality
of Internet connections by converting latency variations into a
musical format.  The conventional method of assessing an Internet ...
http://www.acm.org/technews/articles/2002-4/1202m.html#item3

"Total Info System Totally Touchy"
The Total Information Awareness System proposed by the Pentagon's
Office of Information Awareness will require new database mining
technologies that leave many in the industry unsettled.  The
project, which has received $137 million in funding for 2003, ...
http://www.acm.org/technews/articles/2002-4/1202m.html#item4

"Fishing for Data"
As the amount of digitized information created continues to
increase, ways of extracting needed data are struggling to keep
up.  Meanwhile, researchers are also working on ways to
accommodate wireless computing technologies, such as a project at ...
http://www.acm.org/technews/articles/2002-4/1202m.html#item5

"From Darwin to Internet at the Speed of Light"
The European Space Agency (ESA) is pursuing integrated optics
technology as a way to detect Earth-like planets through the
Darwin project and the ESA/ESO Ground-based European Nullifying
Interferometer Experiment (GENIE); such research could also be ...
http://www.acm.org/technews/articles/2002-4/1202m.html#item6

"Don't Write Off Existing IT Skills"
New research published in vnunet.com's sister publication
Computing concludes that demand for basic IT skills still
exists, but many professionals are in danger of devaluing
them and casting them aside too quickly because of ...
http://www.acm.org/technews/articles/2002-4/1202m.html#item7

"Biology May Help Shrink Electronic Components at NASA"
Researchers at NASA's Ames Research Center are working to
construct electronics that are many times smaller than current
components using proteins that are genetically manipulated to
self-assemble into nanoscale structures.  Principal project ...
http://www.acm.org/technews/articles/2002-4/1202m.html#item8

"DARPA Looks to Quantum Future"
The Defense Advanced Research Projects Agency (DARPA) is
using its High Performance Computing Systems (HPCS)
program as a vehicle for making progress on quantum computing.
DARPA has asked five vendors (include Cray, Hewlett-Packard, ...
http://www.acm.org/technews/articles/2002-4/1202m.html#item9

"The Rogue DNS Phenomenon"
ICANN's cancellation of elections for ICANN board seats was
unpopular among Internet users, most of whom do not realize that
there are alternatives to dealing with ICANN.  ICANN governs the
servers that transform domain names like various .com names into ...
http://www.acm.org/technews/articles/2002-4/1202m.html#item10

"Purdue Panel Maps Safer Wireless World for United Nations"
Addressing the security of wireless networks is critical,
especially for developing countries hoping to enter the
Information Age without taxing their limited financial resources,
according to a report that Purdue University's 2002 Wireless ...
http://www.acm.org/technews/articles/2002-4/1202m.html#item11

"Future Security"
Software vendors know that the market is overcrowded with
information security products, while enterprise customers are
clamoring for applications that are designed for security up front
and that offer real-time system monitoring and rapid response to ...
http://www.acm.org/technews/articles/2002-4/1202m.html#item12

"Coding with Life's Code"
Various projects in the emergent field of DNA computing--which
postulates that biological processes are defined by computational
algorithms--are testing whether DNA molecules can carry out
computations and can be applied to the design of nanotechnology, ...
http://www.acm.org/technews/articles/2002-4/1202m.html#item13

"Seething over Spam"
There is a diverse array of tools and services on the market
designed to block junk email, or spam, thus saving companies
money and improving productivity.  Joyce Graff of Gartner
recommends that small- and medium-sized businesses outsource spam ...
http://www.acm.org/technews/articles/2002-4/1202m.html#item14

"The Making of a Policy Gadfly"
Princeton University computer scientist Edward W. Felten is part
of a growing number of academic researchers who are opposed to
legislation that seeks to regulate digital technology, a move
that reportedly threatens important scientific research and ...
http://www.acm.org/technews/articles/2002-4/1202m.html#item15

"Software Doesn't Work. Customers Are in Revolt. Here's the Plan."
Software developers are striving to make software compatible amid
customers refusing to invest in more products because they have
yet to realize returns on existing systems, which are often
non-interoperable and result in added implementation costs--for ...
http://www.acm.org/technews/articles/2002-4/1202m.html#item16


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


-- To review Wednesday's issue (there was no issue on Friday,
November 29 [day after Thanksgiving]), please visit
http://www.acm.org/technews/articles/2002-4/1127w.html

-- To visit the TechNews home page, point your browser to:
http://www.acm.org/technews/

-- To unsubscribe from the ACM TechNews Early Alert Service:
Please send a separate email to listserv@xxxxxxxxxxxxxxxxx
with the line

signoff technews

in the body of your message.

-- Please note that replying directly to this message does not
automatically unsubscribe you from the TechNews list.

-- To submit feedback about ACM TechNews, contact:
technews@xxxxxxxxxx

-- ACM may have a different email address on file for you,
so if you're unable to "unsubscribe" yourself, please direct
your request to: technews-request@xxxxxxx

We will remove your name from the TechNews list on
your behalf.

-- For help with technical problems, including problems with
leaving the list, please write to:  technews-request@xxxxxxx

----
ACM TechNews is sponsored by Hewlett Packard Company.